General
-
Target
0af7f63cdcd479a73a11f90c9c3868a0ac92560fd80ef973530071205eda367e
-
Size
1019KB
-
Sample
230327-qvqe1afg3x
-
MD5
625e2a1c20e33f72e9170f7dc79c455e
-
SHA1
fede04b63e05f78ed4af80192dc5f2482c37a040
-
SHA256
0af7f63cdcd479a73a11f90c9c3868a0ac92560fd80ef973530071205eda367e
-
SHA512
eb811172dd7a16a3133dca7a64b6239c21f7e26377e5e182d2ad3d0d73f511b8ae6cc0669d7cfabf55d0ddb0c3a69afaf8947ae1a329fd2d8c684feb0e0373c6
-
SSDEEP
24576:kyqiuzFSuvJnr6Ok4rcf+AmPxy/yD1QQPxHW4BFZ250/o:zq2uhr6r4bnPxR1jB3BSu
Static task
static1
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
gong
193.233.20.33:4125
-
auth_value
16950897b83de3bba9e4de36f06a8c05
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
0af7f63cdcd479a73a11f90c9c3868a0ac92560fd80ef973530071205eda367e
-
Size
1019KB
-
MD5
625e2a1c20e33f72e9170f7dc79c455e
-
SHA1
fede04b63e05f78ed4af80192dc5f2482c37a040
-
SHA256
0af7f63cdcd479a73a11f90c9c3868a0ac92560fd80ef973530071205eda367e
-
SHA512
eb811172dd7a16a3133dca7a64b6239c21f7e26377e5e182d2ad3d0d73f511b8ae6cc0669d7cfabf55d0ddb0c3a69afaf8947ae1a329fd2d8c684feb0e0373c6
-
SSDEEP
24576:kyqiuzFSuvJnr6Ok4rcf+AmPxy/yD1QQPxHW4BFZ250/o:zq2uhr6r4bnPxR1jB3BSu
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-